Browse > Article

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation  

Han, Sang woo (단국대학교/컴퓨터학과 소프트웨어보안)
Park, Chang seop (단국대학교/소프트웨어학과)
Cho, Jung mo (단국대학교/컴퓨터학과 소프트웨어보안)
Publication Information
Abstract
Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.
Keywords
IoT(Internet of Things); CoAP(Constrained Application Protocol); DTLS(Datagram TLS); Cooja;
Citations & Related Records
연도 인용수 순위
  • Reference
1 ISO/IEC 20922:2016 Information technology: Message Queuing Telemetry Transport (MQTT) v3.1.1, June 2016
2 Z. Shelby, K. Hartke, and C. Bormann, "The Constrained Application Protocol," IETF RFC 7252, June 2014.
3 M. Kovastsch, "A Low-Power CoAP for Contiki", IEEE Mobile Adhoc and Sensor System(MASS), 2011.
4 L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, "Use Cases for Authentication and Authorization in Constraint Environments," IETF RFC 7744, Jan. 2016.
5 E. Rescorla and N. Modadugu, "Datagram Transport Layer Security," IETF RFC 6347, Jan. 2012.
6 S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," IEEE Sensors Journal, 13(10), 3711-3720, October 2013.   DOI
7 IEEE std. 802.15.4-2011, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), Standard for Information Technology Std., June 2011.
8 G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks," IETF RFC 4944, Sep. 2007.
9 S. Raza, L. Seitz, D. Sitenkov, and G. Selander, "S3K: Scalable Security with Symmetric Keys - DTLS Key Establishment for the Internet of Things," IEEE Transactions on Automation Science and Engineering, 2016.
10 R. Hummen, J. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards Viable Certificate-based Authentication for the Internet of Things," in Proc. of the 2nd ACM Workshop on Hot Topics on Wireless Security and Privacy, pp. 37-42, 2013.
11 Contiki Community, Cooja Simulator, http://www.contiki-os.org/start.html.
12 S. Santesson, M. Myers, R. Ankney, "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP", IETF RFC 6960, 2015.